ChaptersCircleEventsBlog

Download Publication

Zero Trust Guidance For Critical Infrastructure - Korean Translation
Zero Trust Guidance For Critical Infrastructure - Korean Translation
Who it's for:
  • Cybersecurity architects and engineers
  • OT and ICS operators and engineers
  • IT personnel
  • Executive stakeholders

Zero Trust Guidance For Critical Infrastructure - Korean Translation

Release Date: 04/14/2025

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact research@cloudsecurityalliance.org.

In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because their destruction would have a drastic impact on the welfare of a nation. This publication promotes the implementation of Zero Trust principles for securing Critical Infrastructure. As an extensible and holistic enterprise security strategy, Zero Trust is the key for ensuring Critical Infrastructure protection. 

More specifically, this document delves into the nuanced application of Zero Trust for Operational Technology and Industrial Control Systems security strategies. First, it clarifies the foundational concepts of Zero Trust. Then, it provides a tailored roadmap for implementing these principles into Operational Technology and Industrial Control Systems settings. This roadmap employs a systematic five-step approach based on the NSTAC Report to the President on Zero Trust.

By leveraging this guidance, organizations will find a clear forward-looking path for continuous improvement of their security postures.

Key Takeaways:
  • Unique security risks and threat vectors for Critical Infrastructure
  • How Operational Technology converges with digital transformation
  • Differences in objectives and architecture of Operational Technology vs traditional Information Technology
  • Review of the five-step implementation process for Zero Trust
  • How to apply the five-step process to Industrial Controls Systems and Operational Technology security
  • How vendors are building Zero Trust capabilities into new technology
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Zero Trust Guidance for IoT
Zero Trust Guidance for IoT
State of SaaS Security Report 2025
State of SaaS Security Report 2025
What Kind of Identity Should Your AI Agent Have?
What Kind of Identity Should Your AI Agent Have?
Published: 06/25/2025
ESXi Ransomware: The Growing Threat to Virtualized Environments
ESXi Ransomware: The Growing Threat to Virtualized Environments
Published: 06/25/2025
CIEM and Secure Cloud Access Best Practices
CIEM and Secure Cloud Access Best Practices
Published: 06/24/2025
6 Cloud Security Trends Reshaping Risk and Resilience Strategies
6 Cloud Security Trends Reshaping Risk and Resilience Strategies
Published: 06/20/2025

Acknowledgements

Erik Johnson
Erik Johnson
Cloud Security Specialist & Senior Research Analyst, CSA

Erik Johnson

Cloud Security Specialist & Senior Research Analyst, CSA

Worked for the Federal Reserve for many years and volunteered with the CSA with a focus on CCM/CAIQ V4, specifically the STA domain, and developing a comprehensive framework and guidance for defining and managing the cloud shared security responsibility model (SSRM).

I recently retired from the Federal Reserve and am now consulting with the CSA as a Senior Research Analyst with a focus on Zero Trust and Financial Services.

Linke...

Read more

Jennifer Minella Headshot Missing
Jennifer Minella

Jennifer Minella

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Dr. Ron Martin
Dr. Ron Martin
Professor of Practice at Capitol Technology University

Dr. Ron Martin

Professor of Practice at Capitol Technology University

Dr. Martin is a Professor of Practice at Capitol Technology University. His work at Capitol Technology University is in the following functional areas Critical Infrastructure, Industrial Control System Security, Identity, Credential, and Access Management. Ron has relationships with a diverse mix of businesses. He serves as a board of directors for many profit and non-profit organizations. Ron retired from the United States (U. S.) Army in ...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training